<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>(, )-Broadcast Domination in Networks⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Gennaro Cordasco</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Luisa Gargano</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Adele A. Rescigno</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer Science, University of Salerno</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Psychology, University of Campania ”L.Vanvitelli”</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>We study a recently introduced generalization of distance domination in graphs known as (, )Broadcast Domination: A set  of broadcasting vertices transmit a signal of initial strength ; the strength of the signal decays linearly along edges according to distance, that is, a vertex at a distance  &lt;  from a broadcasting vertex  ∈  receives a signal of strength  − , for each  ∈ . The goal is to determine a set  of broadcasting vertices of minimum size, which ensures that every vertex in the network receives a cumulative signal strength of at least . In this paper, we initiate the study of the (, )-Broadcast Domination problem in general graphs. Our results include a general approximation algorithm and optimal polynomial time algorithms for cographs. Moreover, we consider graphs of bounded Neighborhood diversity (nd), and graphs of bounded Iterated type partition number (itp) and give: (i) a fixe d parameter tractable (FPT) algorithm for (, )Broadcast Domination parameterized by nd; (ii) a FPT algorithm for (, )-Broadcast Domination parameterized by itp plus the solution size  = ||; (iii) a FPT algorithm for (, )-Broadcast Domination parameterized by itp plus the demand .</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Broadcast domination</kwd>
        <kwd>Complexity</kwd>
        <kwd>Approximation</kwd>
        <kwd>Parameterized complexity</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>that  is a distance- dominating set of  if any vertex  in  can be reached by a path of
length at most  starting from a vertex in . The distance- domination number of a graph 
is the smallest cardinality of such a set. Notably, distance- domination generalizes standard
domination, where distance-1 domination is equivalent to classical domination.</p>
      <p>
        A recent variation of distance domination is the (, )-Broadcast Domination, first defined
by Blessing et al. in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. As an application consider the following scenario in a wireless network
: A set of broadcast towers on a subset of a graph’s vertices, each has a signal strength . Each
tower provides itself a signal strength of , its neighbors  − 1, and so on, decreasing by 1 as it
traverses each edge until the signal dies out. The goal of the (, )-Broadcast Domination
problem is to determine the minimal number of towers needed to ensure every vertex in 
receives a cumulative signal strength of at least .
      </p>
      <p>
        Another application addresses the issue of efectively crafting accurate and evidence-based
information to combat misinformation. In epidemiology, graph-based information difusion
algorithms can be used to find the smallest set of individuals who can cooperate in immunizing
the vertices in order to prevent the spreading of negative narratives [
        <xref ref-type="bibr" rid="ref12 ref17 ref26">12, 17, 26</xref>
        ]. While these
algorithms are not designed for intercepting fakes, they can be used as a component in a
broader strategy for identifying and mitigating the spread of fake information. (, )-Broadcast
Domination assumes that the strength of the message decreases by passing from one individual
to another.
      </p>
      <p>
        Since its introduction, the (, )-Broadcast Domination problem has been extensively
studied in various special classes of graphs: Two-dimensional grids, paths, triangular grids,
matchstick graphs, and -dimensional grids [
        <xref ref-type="bibr" rid="ref1 ref13 ref15 ref16 ref2 ref22 ref25 ref32 ref4 ref6 ref7">1, 2, 4, 6, 7, 13, 15, 16, 22, 25, 32</xref>
        ].
Our results. In this paper, we initiate the study of the (, )-Broadcast Domination problem
in general graphs.
      </p>
      <p>
        Our results include: (i) a general approximation algorithm and (ii) an optimal polynomial time
algorithm for cographs. Moreover, we consider graphs of bounded Neighborhood diversity (nd),
and graphs of bounded Iterated type partition number (itp) and give: (iii) a fixed parameter
tractable (FPT) algorithm for (, )-Broadcast Domination parameterized by nd; (iv) a FPT
algorithm for (, )-Broadcast Domination parameterized by itp plus the solution size  =
||; (v) a FPT algorithm for (, )-Broadcast Domination parameterized by itp plus .
We recall that a problem with input size  and parameter  is called fixed-parameter tractable
(FPT) if it can be solved in time  () · , where  is a computable function only depending on
 and  is a constant [
        <xref ref-type="bibr" rid="ref14 ref30">14, 30</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. The problem</title>
      <p>Let  = ( (), ()) be an undirected graph and two vertices ,  ∈  (), we denote by
 = | ()| the number of vertices in  and by (, ) the distance between  and  in .
Moreover, for a vertex  ∈  (), we denote by () = { ∈  () | (, ) ∈ ()} the
neighborhood of  and [] = () ∪ {}. Furthermore, we denote by ,() = { ∈
 () | (, ) ≤ } the neighborhood of radius  around . Clearly, ,1() = []. In the
above notations, we will omit the subscript  whenever the graph is clear from the context.</p>
      <p>A Dominating set in a graph  = (, ) is a subset of  such that every vertex not in the set
has at least one neighbor in the set.
vertices  ⊆  is a (, )- Broadcast Dominating set of  if for each  ∈  , it holds</p>
      <sec id="sec-2-1">
        <title>Definition 1.</title>
        <p>Given an undirected graph  = (, ) and integers  ≥</p>
        <p>1, a subset of
∑︁
∈∩()</p>
        <p>( − (, )) ≥ ,
In this paper, we will consider the following problem.</p>
        <p>(, )-Broadcast Domination:
Input: An undirected graph  = (, ) and two integers  ≥
Output: Find a (, )-Broadcast Dominating set of minimum size.
2,  ≥ 1
We assume that for each  ∈  we have  ≤
∑︀
∈()( − (, )), otherwise, the problem
does not admit any solution. This assumption is harmless, in the sense that it is a polynomially
verifiable condition that does not impact the results.</p>
        <p>It is worth observing that when  = 2 and  = 1 the (, )-Broadcast Domination problem
corresponds to the classical Dominating set problem.</p>
        <p>Finally, since the problem can be solved independently in each connected component of the
input graph, from now on, we assume that the input graph is connected.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Approximation algorithm</title>
      <p>
        Knowing that (, )-Broadcast Domination generalizes the Dominating set problem, by the
hardness results in [
        <xref ref-type="bibr" rid="ref18 ref8">8, 18</xref>
        ], we immediately have the following theorem.
      </p>
      <p>Theorem 1. (, )-Broadcast Domination cannot be approximated to within a factor of
(1 −  ) ln  in polynomial time for any constant  &gt; 0 unless   ⊆   ((log log )).</p>
      <p>
        Moreover, using the same arguments of the proof of Theorem 1 in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], one can easily get
a logarithmic approximation algorithm. We show that the (, )-Broadcast Domination
problem can be recast as a submodular cover problem, and apply a classical results due to
(1)
(2)
Lemma 1. The function  : 2
      </p>
      <p>→ N given in (2), satisfies the following properties:
 ( ) if and only if  is (, )-Broadcast Dominating set; (v)  is submodular.
(i)  is integer valued; (ii)  (∅) = 0; (iii)  is non-decreasing; (iv) A set  ⊆  satisfies  () =
 () =  ( ) is achieved.</p>
      <p>Hence, one can apply the natural greedy algorithm, call it , which starts with  = ∅
and iteratively adds to  the element  ∈  ∖  s.t.  ( ∪ {}) −  () is maximum, until
Theorem 2. (, )-Broadcast Domination problem can be approximated in polynomial time
by a factor ln  + ln(min(, )) + 1.</p>
      <p>
        Wosley [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ].
follows: for all  ⊆  , let
      </p>
      <p>For a graph  = (, ) and integers  ≥ 2,  ≥ 1, we define a function  : 2
→ N, as
 () = ∑︁  (), where  () = min ,
∈
︂(</p>
      <p>∑︁
∈∩()
( − (, )) .</p>
      <p>︂)
 ({}) = ∑︁ min ,</p>
      <p>︂(
∈</p>
      <p>∑︁
∈{}∩()
(− (, ))
︂)
=</p>
      <p>
        ∑︁
∈()
Proof. By a classical result of Wolsey [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ], it follows that algorithm  is a (ln(max∈  ({}))+
1)-approximation algorithm for (, )-Broadcast Domination. For each  ∈  , we have
min (︀ , − (, ))︀ ≤  min(, ).
at most 2 ln  + 1.
      </p>
      <p>It is worth observing that we can always assume that  ≤  − 1, since the distances between
two nodes are at most equal to  − 1. Hence, the approximation guaranteed by the Theorem is</p>
    </sec>
    <sec id="sec-4">
      <title>4. A polynomial time algorithm for cographs</title>
      <p>
        Cographs have been discovered independently many times since the 1970s, with diferent
equivalent definitions [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. We are going to adopt the following definition.
      </p>
      <sec id="sec-4-1">
        <title>Definition 2.</title>
        <p>A cograph is a graph that can be constructed using the following recursive rules:
• Any single-vertex graph is a cograph;
• The disjoint union 1 ⊕ 2 of two cographs is a cograph.
• The join 1 ⊗ 2 of two cographs is a cograph.</p>
        <p>1 ⊕ 2 is the graph with vertex set  (1) ∪  (2) and edge set (1) ∪ (2).
 (1),  ∈  (2)}.
1 ⊗</p>
        <p>2 has vertex set  (1) ∪  (2) and edge set (1) ∪ (2) ∪ {(, ) |  ∈</p>
      </sec>
      <sec id="sec-4-2">
        <title>Definition 3.</title>
        <p>A cotree  () is a binary parse tree defining a cograph , in which the leaves are
the vertices of  and each internal vertex labeled ⊕ (resp. ⊗ ) represents the disjoint union (resp.
Observation 1. If a cograph  is connected, then the root of the cotree is labeled ⊗ and the
Consider a connected cograph  = (, ), the cotree  associated to , and integers
1. We recursively compute a solution of the (, )-Broadcast Domination problem.
The algorithm uses the dynamic-programming design pattern and traverses the cotree  in a
join) operation.
diameter is at most 2.
 ≥
optimal solutions, for each internal node of  ∈  considering all the possible contributions, of
vertices in  ∖  (). Specifically, we compute bottom-up the solutions associated with each
internal node  ∈  for each demand ′ = 1, . . . , . A solution with demand ′ =  −  will
be used when we assume that each node in  () receives a cumulative signal strength  from
vertices in  ∖  ().</p>
        <p>The following definition introduces the values that will be computed by the algorithm in
order to be able to compute the solution of the (, )-Broadcast Domination problem.</p>
      </sec>
      <sec id="sec-4-3">
        <title>Definition 4.</title>
        <p>Given a cograph  = (, ) and two integers  ≥
2,  ≥ 1 we denote by  (, )
the size of a smallest (, )-Broadcast Dominating set for , where the distance function is redefined
as ′(, ) = min(2, (, )), for each ,  ∈  .</p>
        <p>For  = 0, we also define this value for any cograph  as  (, 0) = 0.</p>
        <p>Formally, we are going to compute the value  ((), ′), for each  ∈  and ′ = 0, 1, . . . , .
components of () is 2 in .</p>
        <p>Observation 2. The reason for using the redefined distance function is as follows. For each internal
node  ∈  labeled with ⊗ (join) the redefined function matches the original one, while when  is
labeled with ⊕ (disjoint union), we have that  is associated with two disconnected components. In
this case, since the graph  is connected, and the vertices in  (), by construction, will share the
same neighborhood in  ∖  (), we know that the distance between vertices belonging to diferent
is  ((), ) where  is the root of .</p>
        <p>The solution for the instance ⟨, , ⟩ of our original (, )-Broadcast Domination problem
recursively in time (2).</p>
        <p>Lemma 2. For each  ∈  , the computation of  ((), ′) for each ′ = 1, . . . ,  can be done
values of  ((), ′), for each ′ = 1, . . . , .</p>
        <p>Proof. Consider a node  ∈  , we show how to use a bottom-up strategy to compute all the
For each leaf  ∈  we have that () is a single vertex. Then,
nodes, we show how to calculate each value  ((), ′), for each ′ = 1, . . . , , in time (′).</p>
        <p>We have two cases to consider according to the label of  (cf. Definition 3):
1) Node  is labeled ⊕ (i.e., represents the disjoint union operation).</p>
        <p>In this case we have that () = 1 ⊕ 2 where 1 = (1, 1) and 2 = (2, 2) are the
graphs associated with the children of  in  . By Observation 2, we assume that the distance
between vertices belonging to the two components 1 and 2 is 2.</p>
        <p>For each ′ = 1, . . . , , we can fix the demand 1 (2) for 1 (2) and compute the solution
for the other graph 2 (1) ensuring that both solutions satisfy the demand ′.</p>
        <p>Fixed the value of ′, we denote by 1 the minimum value of 1, which represents the portion
of the demand ′ satisfied by vertices in 1. Since the distance between vertices belonging to
the two components is 2, we have that each vertex in 2 provides a signal strength of  −
vertices in 1 and overall they should cover the residual demand ′ − 1. Hence, the value of 1
2 to
corresponds to the smallest non negative integer such that |2| ≥
which corresponds to the residual demand on 1. We have,
a value of 1 smaller than 1, we have that the contribution of vertices in 2 is not enough
to reach ′ and hence such values are not compatible with a solution for (). Then, for each
1 ≤ 1 ≤ ′, we compute the value 2 = max(0, ′ − (− 2) (1, 1)), which corresponds to
the residual demand on 2. Similarly, let 2 the smallest non negative integer such that |1| ≥
⌈︁ ′− 2 ⌉︁. For each 2 ≤ 2 ≤ ′, we compute the value 1 = max(0, ′ − ( − 2) (2, 2)),
− 2
− 2
⌈︁ ′− 1 ⌉︁. Indeed, by choosing
(3)
min
︂(</p>
        <p>min</p>
        <p>min
2≤ 2≤ ′
︂(
︂(
 (2, 2)+ max
distance between vertices belonging to the two components 1 and 2 is 1.
Let () = 1 ⊗
2) Node  is labeled ⊗ (i.e., represents the join operation).</p>
        <p>2. We repeat the reasoning above by considering that, in this case,the</p>
        <p>Let 1 be the smallest non negative integer such that |2| ≥
′, we compute the value 2 = max(0, ′ − ( − 1) (1, 1)).</p>
        <p>Similarly, let 2 the smallest non negative integer such that |1| ≥
2 ≤ 2 ≤ ′, we compute the value 1 = max(0, ′ − ( − 1) (2, 2)). We have,
− 1
⌈︁ ′− 2 ⌉︁. For each
⌈︁ ′− 1 ⌉︁. For each 1 ≤ 1 ≤
− 1
min</p>
        <p>min</p>
        <p>min
algorithm is correct and the overall computation associated to a node  ∈  is (2).
with the definition of  (· , · ) and both the values are computed in time (′); hence, the
Theorem 3. When  is a cograph, the (, )-Broadcast Domination problem is solvable in
time (2 + ).</p>
        <p>Proof. We recall that: (i) Building the cotree  associated to a given cograph  can be done in
linear time (( + )); (ii) the cotree contains 2 − 1 vertices (it has  leaves).
Hence, exploiting Lemma 2, we can build the desired solution  (, ) in time (2 + ).
The optimal set  can be computed in the same time by standard backtracking techniques.
5. Graphs of bounded neighborhood diversity or itp number
In this section, we recall the definitions of Neighborhood diversity and Iterated type partition
number of a graph and give FPT algorithms for graphs in which such parameters are bounded.
Definition 5. The following operations can be used to construct any graph:
(O1) The creation of an isolated vertex.
(O2) The substitution of the vertices 1, . . . , ℓ of an outline graph  by the graphs
1, . . . , ℓ, denoted by (1, . . . , ℓ), is the graph  = (, ) with
 = ⋃︀
 =
1≤ ≤ ℓ
1≤ ≤ ℓ  ()
⋃︁ ()∪{(, ) |  ∈ ,  ∈  , (, ) ∈ (), 1 ≤  &lt;  ≤ ℓ}.</p>
        <p>Notice that the disjoint union and join operations of Definition 2 are special cases of (O2) with
ℓ = 2.
vertices in , that is,  = ⋃︀</p>
        <p>1≤ ≤ ℓ  where  ⊆  ().
 () =  () ∖  (), for each  = 1, . . . , ℓ.</p>
        <p>Let  = (1, . . . , ℓ) be a connected graph. According to operation (O2):  is a connected
outline graph with ℓ vertices and  is a subgraph of  such that for all ,  ∈  (),  () ∖</p>
        <p>Let  be a (, )-Broadcast Dominating set of . Denote by  the subset of  including the
 ∈  (), we have</p>
        <p>In the following, we give a reformulation of the condition in (1) of Definition 1 that takes
into account the construction of  in terms of the operation (O1)–(O2) described in Definition
5 and that will be useful to present our algorithms.</p>
        <p>Since  is a connected graph then also  is a connected graph. Hence, we have that
(, ) =  (, ) for each  ∈  ( ) for  ̸= . Hence, knowing that  ≥
each vertex  ∈  (), with 1 ≤  ≤
ℓ, is at distance at most 2 from any  ∈  (), and
2, for each
| ∩ ,()| = | ∩  ()| +</p>
        <p>| ∩  ( )| = || +
∑︁
|̸=
 (,)≤ 
and</p>
        <p>∑︁
(, ) = ∑︁ (, ) +
∈
∑︁
|̸=
 (,)≤ 
| |  (, )
(( − 2) || + 2 + | ∩  [] |) +
| |( −  (, )) ≥ 
Notice that the first part in each of the two sums of (7) and (8) refers to the relation between
relation between vertex  in  ( ) and all the other vertices  in  ( ).
 ∈  () and the vertices of the solution set in  (i.e., ) while the second part refers to the
=| ∩  ()| + 2 | ∖  []| +</p>
        <p>| |  (, ).
∑︁
|̸=
 (,)≤ 
∑︁
|̸=
 (,)≤ 
∑︁
|̸=
 (,)≤</p>
        <p>| |
∑︁
|̸=
 (,)≤ 
∑︁
|̸=
 (,)≤ 
︂)</p>
        <p>(6)
= || − |  ∩  ()| − 2 | ∖  []| +
| | ( −  (, )).
∑︁
|̸=
 (,)≤ 
Now, we consider that ( ∩  ()) ∩ ( ∖  []) = ∅ and
– for  ̸∈  it holds ( ∩  ()) ∪ ( ∖  []) = , and
– for  ∈  it holds ( ∩  ()) ∪ ( ∖  []) =  ∖ {}. Then,
| ∩  ()| + 2 | ∖  [] | =
{︃2|| − |  ∩  []|
2|| − 2 − |  ∩  []|
if  ̸∈ ,</p>
        <p>∈∩,()( − (, )) ≥ , for each vertex  ∈  (),
(( − 2) || + | ∩  [] |) +
| |( −  (, )) ≥</p>
        <sec id="sec-4-3-1">
          <title>5.1. Neighborhood Diversity</title>
          <p>
            The neighborhood diversity of a graph was introduced by Lampis in [
            <xref ref-type="bibr" rid="ref28">28</xref>
            ]. Given a graph
 = (, ), two vertices ,  ∈  have the same type if  () ∖ {} =  () ∖ {}. The
neighborhood diversity of a graph , nd(), is the minimum number ℓ of sets in a partition
1, 2, . . . , ℓ, of the vertex set  , such that all the vertices in  have the same type, for
 = 1, . . . , ℓ. By definition, each  induces either a clique or an independent set in . In this
paper, we will use the following equivalent definition based on the operations (O1)-(O2).
Definition 6. A graph  has neighborhood diversity ℓ ≥ 1 if ℓ is the minimum integer such that
 = (1, . . . , ℓ) where  is either a clique or an independent set, for each  = 1, . . . , ℓ.
          </p>
          <p>The following theorem states that the (, )-Broadcast Domination problem is FPT with
respect to the neighborhood diversity of the input graph.</p>
          <p>We denote by nd the neighborhood diversity of the input graph  = (1, . . . , nd).
Theorem 4. The (, )-Broadcast Domination
(nd5nd+(nd) log ) where  = max{, , | ()|}.
problem
is solvable in time
Proof. Denote by  the vertex set of . Let  be a (, )-Broadcast Dominating set of . For
each  = 1, . . . , nd, define  =  ∩ .</p>
          <p>In order to give an algorithm solving the (, )-Broadcast Domination problem for , we
characterize (7) and (8) for . Let  ∈  with 1 ≤  ≤ nd. If  is a clique then
| ∩  ()| =
{︃||</p>
          <p>if  ̸∈ ,
|| − 1 otherwise.</p>
          <p>By (7) and (8) we have
If  is an independent set then | ∩  ()| = 0 and by (7) and (8) we have
By the above inequalities, it is easy to see that an instance ⟨, , ⟩ of (, )-Broadcast
Domination has a solution  = ⋃︀1≤ ≤ nd  with  ⊆  if and only if the following Integer Linear
Programming has a solution x = (1, . . . , nd) such that  consists of any  = || vertices
( − 1) || +
 ( −  (, )) ≥ 
∀ such that 1 ≤  ≤ nd and  is a clique
(2) ( − 2) + 2 +
 ( −  (, )) ≥ 
∀ such that 1 ≤  ≤ nd and  is an ind. set
of . The binary variable , indicates whether  =  or not; in particular,  ∈ {0, 1} and by
constraints (3)-(4) below, we have that if  = 1 then  = ||.</p>
          <p>min</p>
          <p>∑︁
=1,...,nd</p>
          <p>
            (1) ( − 1) +  +
(3)  ≥ | |
(4)  ≤ | |
(5)  ∈ {0, 1}
subject to:
∑︁
|̸=
 (,)≤ 
∑︁
∀ = 1, . . . , nd
∀ = 1, . . . , nd
∀ = 1, . . . , nd
To evaluate the time to solve the above ILP, we use a well-known result, stated in [
            <xref ref-type="bibr" rid="ref19 ref29">19, 29</xref>
            ]: Any
ℓ-Variable Integer Linear Programming Feasibility can be solved in time (ℓ2.5ℓ+(ℓ) · ) where
 is the number of bits in the input. [
            <xref ref-type="bibr" rid="ref19 ref29">19, 29</xref>
            ], where
ℓ-Variable Integer Linear Programming Feasibility
Instance: A matrix  ∈ Z× ℓ and a vector  ∈ Z.
          </p>
          <p>Question: Is there a vector  ∈ Zℓ such that  ≥ ?
Hence, observing that the considered ILP uses at most 2 nd variables and that the coeficients
are upper bounded by  = max{, , | ()|}, we have that it can be solved within time
(nd5nd+(nd) log ).</p>
        </sec>
        <sec id="sec-4-3-2">
          <title>5.2. Iterated type partition number</title>
          <p>
            Given a graph , the iterated type partition number of , introduced in [
            <xref ref-type="bibr" rid="ref10">10</xref>
            ], is defined by
iteratively contracting clique and independent set subgraphs having the same neighborhood
until a prime graph is obtained; a graph is called prime if no more contractions are possible.
The iterated type partition number, denoted itp(), is the number of vertices of the obtained
prime graph. It can be shown that the vertices of the obtained prime graph represent subgraphs
that are cographs. An example of a graph  with itp() = 5 and its iterative identification is
given in Figure 1.
          </p>
          <p>
            Trivially, for each graph  we have itp() ≤ nd(). See also [
            <xref ref-type="bibr" rid="ref10">10</xref>
            ] for a discussion on the
relations with other graph parameters.
          </p>
          <p>In this paper, we will use the following equivalent definition based on the operations (O1)-(O2).
Definition 7. A graph  has iterated type partition number ℓ ≥ 1 if ℓ is the minimum integer
such that  = (1, . . . , ℓ) for cographs 1, 2, . . . , ℓ and an outline graph .</p>
          <p>We denote by itp the iterated type partition number of the input graph .</p>
          <p>v1
v3
v4</p>
          <p>M6
v10</p>
          <p>M4
v8
M7
(b)
v9</p>
          <p>M2</p>
          <p>M4 M5
Observation 3. We notice that if  = (1, . . . , itp) is connected then for each ,  ∈  ()
the distance between  and  in  is at most 2, for any  = 1, . . . , itp. Indeed, if  is connected,
then it is a connected cograph and has a diameter at most 2. If  is not connected, there exists 
such that (, ) is an edge in . Hence,  and  have common neighbors in  ( ). Hence, as in
Observation 2, the use of the values in Definition 4 is correct.</p>
        </sec>
        <sec id="sec-4-3-3">
          <title>Algorithm for bounded itp and solution size</title>
          <p>Using the strategy adopted in Section 4, we are able to compute in time (2 + ) the values
 (, ′) as well as the corresponding solutions denoted Γ ,′ , for each cograph  with
 = 1, . . . , itp and ′ = 1, . . . , 
Definition 8. Given a cograph  = (, ) and two integers  ≥ 2,  ≥ 1 we denote by  (, )
the value of the largest demand ′ such that there exists a set  of size at most  (|| ≤ )
and  is a (, ′)-Broadcast Dominating set of , where the distance function is redefined as
′(, ) = min(2, (, )), for each ,  ∈  .</p>
          <p>Using the values  (, ′) and the solutions Γ ,′ , for each cograph  with  = 1, . . . , itp
and each ′ = 1, . . . ,  we are able to compute in time () the values  (, ) for  =
1, . . . , itp and  = 1, 2, . . . , | ()|, as well as the corresponding solutions denoted B,.
Theorem 5. (, )-Broadcast Domination is solvable in time (itp( + 1)itp+1 + 2 + ).
Proof. Algorithm ITP- starting from  = 1 increases the budget until a solution is identified.
We recall that we are assuming that for each  ∈  we have  ≤ ∑︀∈()( − (, )), hence
the problem does admit a solution.</p>
          <p>Fixed a budget , the algorithm considers all the possible vectors s = (1, . . . , itp) where
 = ∑︀i=tp1  and 0 ≤  ≤ min(, | ()|). For each vector, the algorithm evaluates whether
there exists a solution  such that || =  where  =  ∩  (), for each 1 ≤  ≤ itp.
Specifically, it computes the values ′, corresponding to the residual demand on  considering
the contribution of nodes in  ∖ . Such contribution depends only on the sizes  of each 
with  ̸= . Then the values  (· , · ) are exploited to check whether each component  is able
to reach the residual demand ′, using the assigned budget . If this is the case, the solution set
is determined in line 4 and returned by the algorithm.</p>
          <p>For each  = 1, . . . , itp and  ∈  () we have
 (, ) =</p>
          <p>∑︁
∈B, ∩,()
( − (, )) ≥ ′ =  −</p>
          <p>( −  (, )),
∑︁
Algorithm 1: ITP- ( = (1, . . . , itp), , , (· , · ),B· ,· )</p>
          <p>Input: A graph  = (1, . . . , itp), a radius , a demand , and values  (, ) for
each  = 1, . . . , itp and  = 1, . . . , | ()|, with their associated solutions
B,.</p>
          <p>Output:  a solution for the (, )-Broadcast Domination problem for .
1 for  = 1 to  do
2 for each s = (1, . . . , itp) | ∑︀i=tp1 = and 0 ≤  ≤
3 for  = 1, . . . , itp do ′ =  − ∑︁
min(, | ()|) do
 ( −  (, ))
4</p>
          <p>|̸=
 (,)≤ 
if ⋀︀itp</p>
          <p>=1 ( (, ) ≥ ′) then return  = ⋃︀i=tp1 B,
and consequently</p>
          <p>∑︁
( − (, )) + ∑︁ ⎝</p>
          <p>∑︁
̸=
∈∩,()
∑︁
( − (, )) +
 ( −  (, )) ≥ .</p>
          <p>⎞
( − (, ))⎠
⎛
Finally, we notice that Algorithm ITP- requires time (itp ( + 1)itp). Moreover, the time
to obtain all the values  (, ) and the corresponding solutions B, for  = 1, . . . , itp and
 = 1, 2, . . . , | ()|, is (2 + ).</p>
        </sec>
        <sec id="sec-4-3-4">
          <title>Algorithm for bounded itp and demand</title>
          <p>Let  = (1, . . . , itp). In this section, we design an FPT algorithm to solve the (,
)Broadcast Domination problem for  parameterized by itp and the demand . The algorithm
exploits the values  (, ′) that can be obtained using the strategy adopted in Section 4, for
each cograph  with 1 ≤  ≤ itp and ′ = 1, . . . , . We recall that  (, 0) = 0, for each
cograph .</p>
          <p>Theorem 6. (, )-Broadcast Domination is solvable in time (itp ( + 1)itp + 2 + ).
Proof. Algorithm ITP- considers all the possible vectors r = (1, . . . , itp), where  = 0, . . . , 
and  = 1, . . . , itp, and for each of them verifies if each value  satisfies</p>
          <p>∑︁
 ≥  −</p>
          <p>( ,  )( −  (, )).</p>
          <p>|̸=
 (,)≤ 
Assuming that (9) holds for each  in r, select the vertex set (r) = ⋃︀1≤ ≤ itp Γ , , where
Γ , ⊆  () is obtained by using the strategy in Section 4 with |Γ , | =  (, ). For
 ∈  () and  = 1, . . . , itp, we have
∑︁
(9)
(10)
( − (, )) ≥ .</p>
          <p>∈Γ, ∩,()
|̸=
 (,)≤ 
if  &gt; ∑︀1≤ ≤ itp  (, ) then  =
Algorithm 2: ITP-( = (1, . . . , itp), , , (· , · ))</p>
          <p>Input: A graph  = (1, . . . , itp), a radius , a demand , and values  (, ′) for
each  = 1, . . . , itp and ′ = 1, . . . , .</p>
          <p>Output: The vector of demands r.
1  = ∞ and r = (0, . . . , 0)
2 for each r = (1, . . . , itp) such that 0 ≤  ≤ , 1 ≤ ,  ≤ itp do</p>
          <p>itp ⎛ ⎞
3 if ⋀=︁1 ⎜⎝ ≥  − ∑︁  ( ,  )( −  (, ))⎟⎠ then
∑︁  (, ) and r = r
1≤ ≤ itp
4
5 return r;
By (9) and (10), it holds</p>
          <p>Hence, the set (r) = ⋃︀1≤ ≤ itp Γ , is a (, )-Broadcast Dominating set of .</p>
          <p>Furthermore, since Algorithm ITP- returns, among all the vectors r whose components 
satisfy (9) and (10) for each  = 1, . . . , itp, the vector r (see lines 4-5) such that
r = arg min |(r)|,</p>
          <p>r
we can reconstruct the set (r) that is a solution for the instance ⟨, , ⟩ of the (,
)Broadcast Domination problem.</p>
          <p>Finally, we notice that Algorithm ITP- requires time (itp ( + 1)itp). Moreover the time
to obtain all the values  (, ′) and the solutions Γ ,′ , for  = 1, . . . , itp and ′ = 1, . . . , ,
is (2 + ).</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>6. Discussion</title>
      <p>The (, )-Broadcast Domination problem has been recently introduced and studied in some
special classes of graphs (mainly grid graphs and lattices). We have initiated the study of the
(, )-Broadcast Domination problem in general graphs. We have designed an
approximation algorithm for general graphs and optimal polynomial time algorithms for cographs and
graphs of bounded Neighborhood diversity (nd). Moreover, we have presented FPT algorithms
parameterized by Iterated type partition number (itp) plus the solution size  = || and by itp
plus the demand . It eluded us the design of an FPT algorithm for the problem parameterized
by itp only, which we leave as an open problem.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>W.</given-names>
            <surname>Abbas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. B.</given-names>
            <surname>Egerstedt</surname>
          </string-name>
          .
          <article-title>Securing multiagent systems against a sequence of intruder attacks</article-title>
          . In American Control Conference, Montreal, Canada, (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S.</given-names>
            <surname>Alanko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Crevals</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Isopoussu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Östergard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Petterson</surname>
          </string-name>
          .
          <article-title>Computing the domination number of grid graphs</article-title>
          .
          <source>In Electron. J. Combin</source>
          .
          <volume>18</volume>
          (
          <issue>1</issue>
          ), (
          <year>2011</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>C.</given-names>
            <surname>Berge</surname>
          </string-name>
          .
          <article-title>Theory of Graphs and Its Applications</article-title>
          . Methuen, London, (
          <year>1962</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>D.</given-names>
            <surname>Blessing</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Insko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Johnson</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Mauretour</surname>
          </string-name>
          . On (t, r) Broadcast
          <source>Domination Numbers of Grids. In Discrete Applied Mathematics</source>
          ,
          <volume>187</volume>
          , pp.
          <fpage>19</fpage>
          -
          <lpage>40</lpage>
          , (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A.</given-names>
            <surname>Brandstadt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. B.</given-names>
            <surname>Le</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. P.</given-names>
            <surname>Spinrad. Graph Classes</surname>
          </string-name>
          :
          <string-name>
            <given-names>A</given-names>
            <surname>Survey.</surname>
          </string-name>
          <string-name>
            <surname>SIAM</surname>
          </string-name>
          , (
          <year>1999</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>T. Y.</given-names>
            <surname>Chang</surname>
          </string-name>
          .
          <article-title>Domination numbers of grid graphs (</article-title>
          <source>Ph.D. thesis)</source>
          , Dept. of Mathematics, University of South Florida, (
          <year>1992</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>T. Y.</given-names>
            <surname>Chang</surname>
          </string-name>
          ,
          <string-name>
            <surname>W. E. Clark.</surname>
          </string-name>
          <article-title>The domination numbers of the 5 × n and 6 × n grid graphs</article-title>
          .
          <source>In J. Graph Theory 17</source>
          , pp.
          <fpage>81</fpage>
          -
          <lpage>107</lpage>
          , (
          <year>1993</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.</given-names>
            <surname>Chlebík</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Chlebíkova</surname>
          </string-name>
          .
          <article-title>Approximation hardness of dominating set problems in bounded degree graphs</article-title>
          .
          <source>Information and Computation</source>
          <volume>206</volume>
          , pp.
          <fpage>1264</fpage>
          -
          <lpage>1275</lpage>
          , (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>F.</given-names>
            <surname>Cicalese</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Milanic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Vaccaro</surname>
          </string-name>
          .
          <article-title>On the approximability and exact algorithms for vector domination and related problems in graphs</article-title>
          .
          <source>Discrete Appl</source>
          . Math.
          <volume>161</volume>
          (
          <issue>6</issue>
          ), pp.
          <fpage>750</fpage>
          -
          <lpage>767</lpage>
          , (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>G.</given-names>
            <surname>Cordasco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Gargano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Rescigno</surname>
          </string-name>
          .
          <article-title>Parameterized complexity for iterated type partitions and modular-width</article-title>
          .
          <source>In Discrete Applied Mathematics</source>
          ,
          <volume>350</volume>
          , pp.
          <fpage>100</fpage>
          -
          <lpage>122</lpage>
          , (
          <year>2024</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>G.</given-names>
            <surname>Cordasco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Gargano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Rescigno</surname>
          </string-name>
          .
          <article-title>Iterated Type Partitions</article-title>
          .
          <source>In Proc. of Inter. Workshop on Combinatorial Algorithms, IWOCA</source>
          <year>2020</year>
          , LNCS 12126, pp.
          <fpage>195</fpage>
          -
          <lpage>210</lpage>
          , (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>G.</given-names>
            <surname>Cordasco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Gargano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Rescigno</surname>
          </string-name>
          .
          <article-title>Immunization in the Threshold Model: A Parameterized Complexity Study</article-title>
          .
          <source>In Algorithmica 85</source>
          , pp.
          <fpage>3376</fpage>
          -
          <lpage>3405</lpage>
          , (
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>N.</given-names>
            <surname>Crepeau</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. E.</given-names>
            <surname>Harris</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Hays</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Loving</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Rennie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. Rojas</given-names>
            <surname>Kirby</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Vasquez</surname>
          </string-name>
          .
          <article-title>On (t, r) Broadcast Domination of Certain Grid Graphs</article-title>
          .
          <source>In Involve a Journal of Mathematics</source>
          <volume>16</volume>
          (
          <issue>5</issue>
          ), (
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>R. G.</given-names>
            <surname>Downey</surname>
          </string-name>
          and
          <string-name>
            <given-names>M. R.</given-names>
            <surname>Fellows</surname>
          </string-name>
          . Parameterized Complexity, Springer, (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>B. F.</given-names>
            <surname>Drews</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. E.</given-names>
            <surname>Harris</surname>
          </string-name>
          and
          <string-name>
            <given-names>T. W.</given-names>
            <surname>Randolph</surname>
          </string-name>
          .
          <article-title>Optimal (t, r) Broadcasts on the Infinite Grid</article-title>
          .
          <source>In Discrete Applied Mathematics</source>
          <volume>255</volume>
          , pp.
          <fpage>183</fpage>
          -
          <lpage>197</lpage>
          , (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>J.</given-names>
            <surname>Dunbar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Erwin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Haynes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Hedetniemi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. T.</given-names>
            <surname>Hedetniemi</surname>
          </string-name>
          . Broadcasts in graphs.
          <source>Discrete Appl</source>
          . Math.
          <volume>154</volume>
          (
          <issue>1</issue>
          ), pp.
          <fpage>59</fpage>
          -
          <lpage>75</lpage>
          , (
          <year>2006</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>S.</given-names>
            <surname>Ehard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Rautenbach</surname>
          </string-name>
          .
          <article-title>Vaccinate your trees</article-title>
          !
          <source>In Theoretical Computer Science 772</source>
          , pp.
          <fpage>46</fpage>
          -
          <lpage>57</lpage>
          , (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>U.</given-names>
            <surname>Feige</surname>
          </string-name>
          .
          <article-title>A threshold of ln n for approximating set cover</article-title>
          .
          <source>J. ACM</source>
          <volume>45</volume>
          (
          <issue>4</issue>
          ), pp.
          <fpage>634</fpage>
          -
          <lpage>652</lpage>
          . https://doi.org/10.1145/285055.285059, (
          <year>1998</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>M. R.</given-names>
            <surname>Fellows</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Lokshtanov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Misra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. A.</given-names>
            <surname>Rosamond</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Saurabh</surname>
          </string-name>
          .
          <article-title>Graph layout problems parameterized by vertex cover</article-title>
          .
          <source>In Proc. of International Symposium on Algorithms and Computation (ISAAC</source>
          <year>2008</year>
          ),
          <source>LNCS 5369</source>
          , pp.
          <fpage>294</fpage>
          -
          <lpage>305</lpage>
          , (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>T. W.</given-names>
            <surname>Haynes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. T.</given-names>
            <surname>Hedetniemi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. J.</given-names>
            <surname>Slater</surname>
          </string-name>
          . Fundamentals of Domination in Graphs. Marcel Dekker. Inc., New York, (
          <year>1998</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>T. W.</given-names>
            <surname>Haynes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. T.</given-names>
            <surname>Hedetniemi</surname>
          </string-name>
          and
          <string-name>
            <given-names>P. J.</given-names>
            <surname>Slater</surname>
          </string-name>
          . Domination in Graphs - Advanced
          <string-name>
            <surname>Topics</surname>
          </string-name>
          . Marcel Dekker. Inc., New York, (
          <year>1998</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>P. E.</given-names>
            <surname>Harris</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Luque</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Flores</surname>
          </string-name>
          and
          <string-name>
            <given-names>N.</given-names>
            <surname>Sepulveda</surname>
          </string-name>
          .
          <article-title>Eficient (t, r) Broadcast Dominating Sets of the Triangular Lattice</article-title>
          .
          <source>In Discrete Applied Mathematics</source>
          <volume>277</volume>
          , pp.
          <fpage>180</fpage>
          -
          <lpage>192</lpage>
          , (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Henning</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. R.</given-names>
            <surname>Oellermann</surname>
          </string-name>
          and
          <string-name>
            <given-names>H. C.</given-names>
            <surname>Swart</surname>
          </string-name>
          .
          <article-title>Bounds on Distance Domination Parameters</article-title>
          .
          <source>In Journal of Combinatorics, Information and System Sci. 16</source>
          , pp.
          <fpage>11</fpage>
          -
          <lpage>18</lpage>
          , (
          <year>1991</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Henning</surname>
          </string-name>
          .
          <article-title>Distance Domination in Graphs</article-title>
          . In Topics in Domination in Graphs.
          <source>In Developments in Mathematics 64</source>
          ,
          <fpage>10</fpage>
          .1007/978-3-
          <fpage>030</fpage>
          -51117-
          <issue>3</issue>
          _
          <fpage>7</fpage>
          , (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>R.</given-names>
            <surname>Herrman</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>Hintum.</surname>
          </string-name>
          <article-title>The (t, r) Broadcast Domination Number of Some Regular Graphs</article-title>
          .
          <source>In Discrete Applied Mathematics</source>
          <volume>289</volume>
          , pp.
          <fpage>270</fpage>
          -
          <lpage>280</lpage>
          , (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>M.</given-names>
            <surname>Kimura</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Saito</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Motoda</surname>
          </string-name>
          .
          <article-title>Blocking links to minimize contamination spread in a social network</article-title>
          .
          <source>In ACM Trans. Knowl. Discovery Data</source>
          <volume>3</volume>
          (
          <issue>2</issue>
          ), (
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>M.</given-names>
            <surname>Lafond</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Luo</surname>
          </string-name>
          .
          <article-title>Parameterized Complexity of Domination Problems Using Restricted Modular Partitions</article-title>
          .
          <source>In MFCS 2023</source>
          , pp.
          <volume>61</volume>
          :
          <fpage>1</fpage>
          -
          <lpage>61</lpage>
          :
          <fpage>14</fpage>
          , (
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>M.</given-names>
            <surname>Lampis</surname>
          </string-name>
          .
          <article-title>Algorithmic meta-theorems for restrictions of treewidth</article-title>
          .
          <source>In Algorithmica 64</source>
          , pp.
          <fpage>19</fpage>
          -
          <lpage>37</lpage>
          , (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>H. W.</given-names>
            <surname>Lenstra</surname>
          </string-name>
          .
          <article-title>Integer programming with a fixed number of variables</article-title>
          .
          <source>In Mathematics of Operations Research</source>
          <volume>8</volume>
          (
          <issue>4</issue>
          ), pp.
          <fpage>538</fpage>
          -
          <lpage>548</lpage>
          , (
          <year>1983</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>R.</given-names>
            <surname>Niedermeier</surname>
          </string-name>
          .
          <article-title>Invitation to Fixed-Parameter Algorithms</article-title>
          . Oxford University Press, (
          <year>2006</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>O.</given-names>
            <surname>Ore</surname>
          </string-name>
          .
          <article-title>Theory of Graphs</article-title>
          . In American Mathematical Society Colloquium Publications, Providence,
          <volume>38</volume>
          , (
          <year>1962</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>T. W.</given-names>
            <surname>Randolph</surname>
          </string-name>
          .
          <article-title>Asymptotically Optimal Bounds for (t, 2) Broadcast Domination on Finite Grids</article-title>
          .
          <source>Rose-Hulman Undergraduate Mathematics Journal</source>
          <volume>20</volume>
          , (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Wolsey</surname>
          </string-name>
          .
          <article-title>An analysis of the greedy algorithm for the submodular set covering problem</article-title>
          .
          <source>Combinatorica 2</source>
          , pp.
          <fpage>385</fpage>
          -
          <lpage>393</lpage>
          , (
          <year>1982</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>